{ "schema_version": "1.4.0", "id": "GHSA-7wwm-8prx-hpg2", "modified": "2025-04-08T21:31:29Z", "published": "2023-01-17T21:30:21Z", "aliases": [ "CVE-2021-36647" ], "details": "Use of a Broken or Risky Cryptographic Algorithm in the function mbedtls_mpi_exp_mod() in lignum.c in Mbed TLS Mbed TLS all versions before 3.0.0, 2.27.0 or 2.16.11 allows attackers with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave such as SGX or the TrustZone secure world) to recover the private keys used in RSA.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-36647" }, { "type": "WEB", "url": "https://github.com/ARMmbed/mbedtls/releases" }, { "type": "WEB", "url": "https://kouzili.com/Load-Step.pdf" }, { "type": "WEB", "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-07-1" } ], "database_specific": { "cwe_ids": [ "CWE-327" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2023-01-17T21:15:00Z" } }